3 Two-Layer Network Design 99
We consider different types of capacities for logical links, physical links, and
nodes. Each logical link ∈ L has a set M
of available capacity modules, each of
them with a cost of
κ
m
∈ R
+
and a base capacity (bit rate) of C
m
∈ Z
+
that can be
installed on in integer multiples. Similarly, every node i ∈V has a set M
i
of node
modules (representing different EXC types), at most one of which may be installed
at i. Module m ∈ M
i
provides a switching capacity of C
m
i
∈ Z
+
(e.g., in bits per
second) at a cost of
κ
m
i
∈R
+
.Onaphysicallinke ∈ E, a fiber may be installed at a
cost of
κ
e
∈ R
+
. Each fiber supports up to B ∈Z
+
lightpaths.
For the routing part, a set H of undirected point-to-point communication de-
mands is given, which may be protected or unprotected. Protected demands are
expected to survive any single physical node or link failure, whereas unprotected de-
mands are allowed to fail. Each demand h ∈ H has a source node, a target node, and
a demand value d
h
to be routed between these two nodes. Without loss of generality,
we may assume the demands to be directed in an arbitrary way. For 1+1-protected
demands, d
h
refers to twice the original demand value that would have to be routed
if the demand were unprotected. Adding constraints that limit the amount of flow
for a protected commodity through a node or physical link to
1
2
d
h
guarantees that at
least the original demand survives any single physical link or node failure. This sur-
vivability model, called diversification [3], is a slight relaxation of 1+1-protection,
but its solutions can often be transformed into 1+1-solutions.
From the demands, two sets K
p
and K
u
of protected and unprotected commodi-
ties are constructed, where K = K
p
∪K
u
denotes the set of all commodities. With
every commodity k ∈K and every node i ∈V , a net demand value d
k
i
∈ Z is associ-
ated such that
∑
i∈V
d
k
i
= 0. Every protected commodity k ∈ K
p
consists of a single
1+1-protected point-to-point demand, i.e., d
k
i
= 0 only for the source and target node
of the demand. In contrast, unprotected commodities k ∈ K
u
are derived by aggre-
gating unprotected point-to-point demands at a common source node. Summarizing,
every commodity k ∈K has a unique source node s
k
∈V . Unprotected commodities
may have several target nodes, whereas protected commodities have a unique target
t
k
∈V . The (undirected) emanating demand of a node i ∈V , i.e., the total demand
value starting or ending at node i, is given by d
i
=
∑
k∈K
|d
k
i
|. The demand value d
k
of a commodity is defined as the demand for k emanating from its source node, i.e.,
d
k
= d
k
s
k
> 0. Notice that for protected commodities, this value is twice the requested
bandwidth to ensure survivability.
Variables
The model comprises four classes of variables representing the flow and different
capacity types. First, for a logical link ∈ L and a module m ∈ M
, the logical link
capacity variable y
m
∈ Z
+
represents the number of modules of type m installed on
. For a physical link e ∈ E, the binary physical link capacity variable z
e
∈{0,1}
indicates whether e is equipped with a fiber or not. Similarly, for a node i ∈V and
a node module m ∈ M
i
, the binary variable x
m
i
∈{0, 1} denotes whether module m
is installed at node i or not. Eventually, the routing of the commodities is modeled